blockstate.team
Open in
urlscan Pro
104.21.34.192
Public Scan
Submission Tags: @ecarlesi possiblethreat #phishing Search All
Submission: On August 05 via api from AU — Scanned from AU
Summary
TLS certificate: Issued by GTS CA 1P5 on August 4th 2023. Valid for: 3 months.
This is the only time blockstate.team was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 104.21.34.192 104.21.34.192 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 69.16.175.10 69.16.175.10 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
14 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
blockstate.team
blockstate.team |
3 MB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 729 |
30 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
12 | blockstate.team |
blockstate.team
|
1 | code.jquery.com |
blockstate.team
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
blockstate.team GTS CA 1P5 |
2023-08-04 - 2023-11-02 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://blockstate.team/contact.html
Frame ID: 79AB5FB98C5E97ADF072878AEF3D8FAD
Requests: 11 HTTP requests in this frame
Frame:
https://blockstate.team/loading.html
Frame ID: AF04E60014CD36E40D75EAEE2E8E05E4
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
contact.html
blockstate.team/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contact.css
blockstate.team/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvertToSVG.webp
blockstate.team/assets/media/ |
38 KB 38 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.html
blockstate.team/ Frame AF04 |
1 KB 740 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Minecraft.otf
blockstate.team/assets/fonts/ |
11 KB 4 KB |
Font
font/otf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MinecraftTen.woff
blockstate.team/assets/fonts/ |
23 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MinecraftFive-Regular.ttf
blockstate.team/assets/fonts/ |
132 KB 26 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rotatingBlock.webm
blockstate.team/assets/media/ |
78 KB 0 |
Media
video/webm |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvertToSVG.webp
blockstate.team/assets/media/ Frame AF04 |
38 KB 38 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rotatingBlock.webm
blockstate.team/assets/media/ Frame AF04 |
2 MB 2 MB |
Media
video/webm |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rotatingBlock.webm
blockstate.team/assets/media/ |
565 B 902 B |
Media
video/webm |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rotatingBlock.webm
blockstate.team/assets/media/ |
478 KB 0 |
Media
video/webm |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
rotatingBlock.webm
blockstate.team/assets/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- blockstate.team
- URL
- https://blockstate.team/assets/media/rotatingBlock.webm
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
blockstate.team/ | Name: connect.sid Value: s%3AXacPFjWcwKKV8wFxFFDLp38-E-gPCMqT.BKNpMU8Bd7CuHXDQLwuYyZyIn3jrrrXKgbt2yS2aowI |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blockstate.team
code.jquery.com
blockstate.team
104.21.34.192
69.16.175.10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